hackvertor / shadow-repeaterLinks
☆41Updated this week
Alternatives and similar repositories for shadow-repeater
Users that are interested in shadow-repeater are comparing it to the libraries listed below
Sorting:
- Make better use of the embedded browser that comes by default with Burp☆45Updated last year
- Repro for Confusion Attacks: Exploiting Hidden Semantic Ambiguity in Apache HTTP Server!☆20Updated last year
- Help recon of hostnames from specific ASN or CIDR, thanks to Robtex and BGP.HE☆54Updated last year
- A powerful AWS Cognito analysis and session hijacking toolkit designed for security researchers and penetration testers. CognitoHunter sp…☆21Updated 9 months ago
- A BurpSuite extension to deploy an OpenVPN config file to DigitalOcean and set up a SOCKS proxy to route traffic through it☆51Updated last week
- Encode and Fuzz Custom Protobuf Messages in Burp Suite☆33Updated 8 months ago
- This tool is designed to test for file upload and XXE vulnerabilities by poisoning XLSX files.☆81Updated last year
- A Burp Suite extension for finding DNS vulnerabilities in web applications!☆94Updated 2 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆73Updated 3 years ago
- Burp extension to check and exploit the IIS Tilde Enumeration/IIS 8.3 Short Filename Disclosure vulnerability☆61Updated 2 years ago
- A project for fuzzing HTTP/1.1 CL.0 Request Smuggling Attack Vectors☆90Updated last year
- Web cache poisoning vulnerability scanner.☆72Updated 3 years ago
- Bcheck scripts for Burp☆29Updated last year
- AI Substitutor is an extension for Burp Suite that uses AI functionality to substitute values of HTTP request parameters and headers.☆27Updated 6 months ago
- A collection of utilities for building extensions using Burp's Montoya API☆52Updated last week
- My talks...☆25Updated 8 months ago
- ☆27Updated 2 years ago
- Nuclei templates for source code analysis. Detects hardcoded secrets, config leaks, debug endpoints. Also helps identify OWASP Top 10 iss…☆80Updated 5 months ago
- Mine URLs from Browser's Heap Snapshot for fun and profit☆64Updated 2 years ago
- Demo of various ways to exploit post based reflected XSS☆18Updated 2 years ago
- ☆86Updated 4 months ago
- ☆41Updated 2 years ago
- Nuclei template to detect Apache servers vulnerable to CVE-2024-38473☆29Updated last year
- Tool for helping in the exploitation of path traversal vulnerabilities in Java web applications☆33Updated 3 years ago
- A set of open-source community scripts☆65Updated last year
- tool that generates bypasses for open redirects☆52Updated 3 years ago
- A Go tool that gets the newest PRs from projectdiscovery/nuclei-templates.☆56Updated 2 years ago
- A python3 script searching for secret on swaggerhub☆66Updated 3 years ago
- Additional resources for leaking and exploiting ObjRefs via HTTP .NET Remoting (CVE-2024-29059)☆91Updated last year
- Security Advisories☆34Updated 2 weeks ago